Identity Management Theory

Results: 97



#Item
51Market failure / Organizational theory / Principal–agent problem / Shareholder resolution / Activism / Incentive / Social movement / Management / Information / Corporate governance / Community organizing / Asymmetric information

The ICGN Annual Academic Meeting: Amsterdam, June 15, 2014 Who do they think they are? The Effect of Activists’ Identity on their Targeting Decisions Kate Sikavica, University of Zurich, Zurich, Switzerland

Add to Reading List

Source URL: www.icgn.org

Language: English - Date: 2014-06-19 06:37:20
52Applied mathematics / Credential / Proof of knowledge / Zero-knowledge proof / Access control / NP / IP / Model theory / Cryptographic protocols / Identity management / Security

This is the full version of an extended abstract published in ACM CCS[removed]Posted as Report[removed]on 19 August 2013; revised 8 September[removed]Algebraic MACs and Keyed-Verification Anonymous Credentials Melissa Chase

Add to Reading List

Source URL: www0.cs.ucl.ac.uk

Language: English - Date: 2014-09-16 08:51:21
53Science / Identity management / Social issues / Knowledge / Game theory / Privacy / Internet privacy / Cryptography / Nash equilibrium / Formal sciences / Decision theory / Ethics

Introduction Basics of game theory Co-utility Co-utility example applications Cryptographic primitives for gradual privacy/utility Conclusions and research directions

Add to Reading List

Source URL: blogs.iec.cat

Language: English - Date: 2013-02-26 05:16:32
54Interpersonal communication / Privacy / Law / Internet privacy / Information privacy / Self-disclosure / Facebook / Uncertainty reduction theory / Identity management / Ethics / Computing / World Wide Web

PRE-­‐PRINT   Joinson,  A.N.,  Houghton,  D.J.,  Vasalou,  A.,  Marder,  BL.  (in  press,   2011).  Digital  Crowding:  Privacy,  Self-­‐Disclosure  and  Technolog

Add to Reading List

Source URL: www.joinson.com

Language: English - Date: 2013-12-18 10:20:22
55Consumer complaint / Consumer theory / Customer experience management / Identity theft / Consumer protection / Business / Marketing / Consumer protection law / Law

NEWS FROM SCDCA SOUTH CAROLINA DEPARTMENT OF CONSUMER AFFAIRS Carri Grube Lybarker, Administrator September 25, 2014 SCDCA Media Contact: Juliana Harris, [removed]Email: [removed]

Add to Reading List

Source URL: www.consumer.sc.gov

Language: English - Date: 2014-09-26 09:19:17
56Human rights / Computing / Identity management / Law / Internet privacy / Political privacy / Facebook / Privacy regulation theory / Privacy Lost / Ethics / Privacy / World Wide Web

Paper  presented  at  ICA  on  May  28,  2011  in  Boston,  MA.  Feedback  wanted!       Social  Steganography:  Privacy  in  Networked  Publics  

Add to Reading List

Source URL: www.danah.org

Language: English - Date: 2011-05-28 12:16:14
57Database management systems / Database theory / NoSQL / Internet Identity / Database / Scalability / Apache Cassandra / Data center / Relational database / Data management / Computing / Data

FRAUD DETECTION IID RELIES ON DATASTAX FOR AROUNDTHE-CLOCK CYBER THREAT MITIGATION Internet Identity (IID) is a cyber security company that provides the platform to easily exchange cyber threat intelligence between ente

Add to Reading List

Source URL: www.datastax.com

Language: English - Date: 2014-08-13 17:36:55
58Identity management / Knowledge / Health care provider / Attachment theory / Human behavior / Personal life / Behavior / Healthcare / Credential

Workforce Training and Education Coordinating Board WA Health Care Worker Training Coalition Quarterly Narrative Report Instructions: The quarterly narrative report is due to the Workforce Board ARRA Grant Manager in MS

Add to Reading List

Source URL: wtb.wa.gov

Language: English - Date: 2012-09-25 12:21:40
59Information theory / Thermodynamics / Identity management / Social issues / Philosophy of thermal and statistical physics / Entropy / Privacy / Degree of anonymity / Principle of maximum entropy / Statistical theory / Statistics / Probability and statistics

A location privacy metric for V2X communication systems Zhendong Ma, Frank Kargl, and Michael Weber Institute of Media Informatics, Ulm University, Germany {zhendong.ma|frank.kargl|michael.weber}@uni-ulm.de Abstract—Th

Add to Reading List

Source URL: www.uni-ulm.de

Language: English - Date: 2009-04-06 08:29:12
60Identity management / Social issues / Ethology / Law / Internet privacy / Information privacy / Location awareness / Privacy regulation theory / Consumer privacy / Privacy / Ethics / Technology

Microsoft Word - editorial

Add to Reading List

Source URL: www.sigspatial.org

Language: English - Date: 2013-05-18 12:19:16
UPDATE